Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues
Report generation date: 2025-07-11

Project overview: bson-rust

High level conclusions

Reachability and coverage overview

Functions statically reachable by fuzzers
1.0%
11 / 1159
Cyclomatic complexity statically reachable by fuzzers
2.0%
23 / 1014
Runtime code coverage of functions
34.0%
393 / 1159

Warning: The number of runtime covered functions are larger than the number of reachable functions. This means that Fuzz Introspector found there are more functions covered at runtime than what is considered reachable based on the static analysis. This is a limitation in the analysis as anything covered at runtime is by definition reachable by the fuzzers.
This is likely due to a limitation in the static analysis. In this case, the count of functions covered at runtime is the true value, which means this is what should be considered "achieved" by the fuzzer.

Use the project functions table below to query all functions that were not covered at runtime.

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: iterate

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 307 63.0%
gold [1:9] 0 0.0%
yellow [10:29] 2 0.41%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 178 36.5%
All colors 487 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
120 141 Timestamp::from_le_bytes call site: 00141 RawElement::try_into
93 34 RawElement::get_oid_at call site: 00034 RawElement::try_into
25 378 usize_try_from_i32 call site: 00378 RawElement::try_into
16 0 EP call site: 00000 RawDocument::decode_from_bytes
8 478 i32_from_slice call site: 00478 RawDocument::new_unchecked
6 17 i32_from_slice call site: 00017
6 128 Timestamp::from_le_bytes call site: 00128 ParsedDecimal128::new
3 338 RawElement::value call site: 00338 Bson::as_str
3 350 RawElement::value call site: 00350 RawElement::try_into
3 447 RawElement::value call site: 00447
2 264 RawElement::get_oid_at call site: 00264 RawElement::try_into
2 313 RawElement::value call site: 00313 RawArray::from_doc

Runtime coverage analysis

Covered functions
117
Functions that are reachable but not covered
14
Reachable functions
18
Percentage of reachable functions covered
22.22%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzz/fuzz_targets/iterate.rs 2
src/raw/document.rs 17
src/serde_helpers.rs 2
src/document.rs 10
src/error.rs 6
src/raw.rs 28
src/raw/iter.rs 13
src/decimal128.rs 61
src/raw/array.rs 4
src/raw/bson_ref.rs 27
src/raw/array_buf.rs 2
src/oid.rs 2
src/ser.rs 8
src/uuid.rs 6
src/ser/serde.rs 19
src/bson.rs 3
src/raw/serde/seeded_visitor.rs 6
src/ser/raw.rs 1
src/tests/serde.rs 7
src/tests/modules/lock.rs 2
src/datetime.rs 1
src/extjson/de.rs 20
src/spec.rs 2

Fuzzer: string_handling

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 315 63.6%
gold [1:9] 0 0.0%
yellow [10:29] 2 0.40%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 178 35.9%
All colors 495 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
120 141 Timestamp::from_le_bytes call site: 00141 RawElement::try_into
93 34 RawElement::get_oid_at call site: 00034 RawElement::try_into
25 378 usize_try_from_i32 call site: 00378 RawElement::try_into
16 0 EP call site: 00000 RawDocument::decode_from_bytes
16 478 i32_from_slice call site: 00478 RawElement::try_into
6 17 i32_from_slice call site: 00017
6 128 Timestamp::from_le_bytes call site: 00128 ParsedDecimal128::new
3 338 RawElement::value call site: 00338 Bson::as_str
3 350 RawElement::value call site: 00350 RawElement::try_into
3 447 RawElement::value call site: 00447
2 264 RawElement::get_oid_at call site: 00264 RawElement::try_into
2 313 RawElement::value call site: 00313 RawArray::from_doc

Runtime coverage analysis

Covered functions
115
Functions that are reachable but not covered
16
Reachable functions
24
Percentage of reachable functions covered
33.33%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzz/fuzz_targets/string_handling.rs 8
src/raw/document.rs 17
src/serde_helpers.rs 2
src/document.rs 10
src/error.rs 6
src/raw.rs 28
src/raw/iter.rs 13
src/decimal128.rs 61
src/raw/array.rs 5
src/raw/bson_ref.rs 27
src/raw/array_buf.rs 2
src/oid.rs 2
src/ser.rs 8
src/uuid.rs 6
src/ser/serde.rs 19
src/bson.rs 3
src/raw/serde/seeded_visitor.rs 6
src/ser/raw.rs 1
src/tests/serde.rs 7
src/tests/modules/lock.rs 2
src/datetime.rs 1
src/extjson/de.rs 20
src/spec.rs 2

Fuzzer: type_markers

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 311 63.3%
gold [1:9] 0 0.0%
yellow [10:29] 2 0.40%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 178 36.2%
All colors 491 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
120 141 Timestamp::from_le_bytes call site: 00141 RawElement::try_into
93 34 RawElement::get_oid_at call site: 00034 RawElement::try_into
25 378 usize_try_from_i32 call site: 00378 RawElement::try_into
16 0 EP call site: 00000 RawDocument::decode_from_bytes
12 478 i32_from_slice call site: 00478 RawElement::try_into
6 17 i32_from_slice call site: 00017
6 128 Timestamp::from_le_bytes call site: 00128 ParsedDecimal128::new
3 338 RawElement::value call site: 00338 Bson::as_str
3 350 RawElement::value call site: 00350 RawElement::try_into
3 447 RawElement::value call site: 00447
2 264 RawElement::get_oid_at call site: 00264 RawElement::try_into
2 313 RawElement::value call site: 00313 RawArray::from_doc

Runtime coverage analysis

Covered functions
115
Functions that are reachable but not covered
14
Reachable functions
21
Percentage of reachable functions covered
33.33%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzz/fuzz_targets/type_markers.rs 5
src/raw/document.rs 17
src/serde_helpers.rs 2
src/document.rs 10
src/error.rs 6
src/raw.rs 28
src/raw/iter.rs 13
src/decimal128.rs 61
src/raw/array.rs 5
src/raw/bson_ref.rs 27
src/raw/array_buf.rs 2
src/oid.rs 2
src/ser.rs 8
src/uuid.rs 6
src/ser/serde.rs 19
src/bson.rs 3
src/raw/serde/seeded_visitor.rs 6
src/ser/raw.rs 1
src/tests/serde.rs 7
src/tests/modules/lock.rs 2
src/datetime.rs 1
src/extjson/de.rs 20
src/spec.rs 2

Fuzzer: decode

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 308 56.6%
gold [1:9] 0 0.0%
yellow [10:29] 2 0.36%
greenyellow [30:49] 2 0.36%
lawngreen 50+ 232 42.6%
All colors 544 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
87 107 RawDocumentBuf::decode_from_bytes call site: 00107 RawElement::try_into
46 456 Timestamp::from_le_bytes call site: 00456 RawElement::try_into
31 6 Timestamp::from_le_bytes call site: 00006 RawElement::try_into
25 354 usize_try_from_i32 call site: 00354 RawElement::try_into
16 510 RawDocumentBuf::new call site: 00510 CString::borrow
14 63 RawDocumentBuf::decode_from_bytes call site: 00063 ElementType::from
13 528 RawArray::as_bytes call site: 00528 RawElement::try_into
11 94 i32_from_slice call site: 00094 RawDocument::new_unchecked
6 78 i32_from_slice call site: 00078
6 219 RawBsonRef::to_raw_bson call site: 00219
6 447 RawElement::value call site: 00447 RawElement::try_into
5 0 EP call site: 00000 Document::decode_from_reader

Runtime coverage analysis

Covered functions
369
Functions that are reachable but not covered
6
Reachable functions
8
Percentage of reachable functions covered
25.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzz/fuzz_targets/decode.rs 6
src/document.rs 14
src/raw.rs 28
src/bson.rs 4
src/raw/serde/seeded_visitor.rs 6
src/decimal128.rs 64
src/raw/iter.rs 13
src/raw/array.rs 4
src/raw/bson_ref.rs 27
src/raw/array_buf.rs 5
src/oid.rs 2
src/ser.rs 8
src/raw/document.rs 17
src/serde_helpers.rs 4
src/error.rs 6
src/uuid.rs 6
src/ser/serde.rs 19
src/tests/serde.rs 7
src/tests/modules/lock.rs 2
src/datetime.rs 1
src/extjson/de.rs 20
src/spec.rs 2
src/ser/raw.rs 1
src/de.rs 7
src/raw/document_buf.rs 4
src/raw/cstr.rs 2

Fuzzer: encoding

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 296 54.2%
gold [1:9] 0 0.0%
yellow [10:29] 4 0.73%
greenyellow [30:49] 2 0.36%
lawngreen 50+ 244 44.6%
All colors 546 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
81 141 Timestamp::from_le_bytes call site: 00141 RawElement::try_into
55 72 Document::len call site: 00072 RawElement::try_into
29 501 RawDocumentBuf::new call site: 00501 RawElement::try_into
25 378 usize_try_from_i32 call site: 00378 RawElement::try_into
17 54 RawDocumentBuf::decode_from_bytes call site: 00054 ParsedDecimal128::new
15 478 i32_from_slice call site: 00478 RawDocumentBuf::try_from
7 0 EP call site: 00000 RawDocument::decode_from_bytes
7 9 Document::len call site: 00009 ElementType::from
6 17 i32_from_slice call site: 00017
6 128 Timestamp::from_le_bytes call site: 00128 ParsedDecimal128::new
6 247 RawBsonRef::to_raw_bson call site: 00247
3 338 RawElement::value call site: 00338 Bson::as_str

Runtime coverage analysis

Covered functions
386
Functions that are reachable but not covered
19
Reachable functions
41
Percentage of reachable functions covered
53.66%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzz/fuzz_targets/encoding.rs 14
src/raw/document.rs 17
src/serde_helpers.rs 2
src/document.rs 10
src/error.rs 6
src/raw.rs 28
src/raw/iter.rs 13
src/decimal128.rs 64
src/raw/array.rs 4
src/raw/bson_ref.rs 27
src/raw/array_buf.rs 5
src/oid.rs 2
src/ser.rs 8
src/uuid.rs 6
src/ser/serde.rs 19
src/bson.rs 4
src/raw/serde/seeded_visitor.rs 6
src/ser/raw.rs 1
src/tests/serde.rs 7
src/tests/modules/lock.rs 2
src/datetime.rs 1
src/extjson/de.rs 24
src/spec.rs 2
src/raw/document_buf.rs 4

Fuzzer: raw_deserialize

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 277 56.0%
gold [1:9] 4 0.80%
yellow [10:29] 4 0.80%
greenyellow [30:49] 4 0.80%
lawngreen 50+ 205 41.4%
All colors 494 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
70 102 Timestamp::from_le_bytes call site: 00102 RawElement::try_into
55 219 Serializer::new call site: 00219 RawElement::try_into
32 173 SerializerHint::take call site: 00173 RawElement::try_into
25 391 usize_try_from_i32 call site: 00391 RawElement::try_into
24 39 RawElement::get_oid_at call site: 00039 RawElement::value
7 64 Document::len call site: 00064 ElementType::from
6 72 i32_from_slice call site: 00072
6 89 Timestamp::from_le_bytes call site: 00089 ParsedDecimal128::new
6 383 read_len call site: 00383
5 488 ParsedDecimal128::new call site: 00488
3 0 EP call site: 00000
3 80 i32_from_slice call site: 00080 RawElement::try_into

Runtime coverage analysis

Covered functions
1909
Functions that are reachable but not covered
3
Reachable functions
3
Percentage of reachable functions covered
0.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzz/fuzz_targets/raw_deserialize.rs 3
src/ser.rs 8
src/decimal128.rs 61
src/document.rs 10
src/raw/iter.rs 13
src/raw/array.rs 4
src/raw/bson_ref.rs 27
src/raw/array_buf.rs 2
src/oid.rs 2
src/raw/document.rs 17
src/serde_helpers.rs 2
src/error.rs 6
src/raw.rs 28
src/bson.rs 3
src/raw/serde/seeded_visitor.rs 6
src/uuid.rs 6
src/ser/serde.rs 19
src/ser/raw.rs 1
src/tests/serde.rs 7
src/tests/modules/lock.rs 2
src/datetime.rs 1
src/extjson/de.rs 20
src/spec.rs 2

Fuzzer: raw_deserialize_utf8_lossy

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 300 60.7%
gold [1:9] 4 0.80%
yellow [10:29] 2 0.40%
greenyellow [30:49] 2 0.40%
lawngreen 50+ 186 37.6%
All colors 494 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
70 102 Timestamp::from_le_bytes call site: 00102 RawElement::try_into
55 219 Serializer::new call site: 00219 RawElement::try_into
32 173 SerializerHint::take call site: 00173 RawElement::try_into
25 391 usize_try_from_i32 call site: 00391 RawElement::try_into
24 39 RawElement::get_oid_at call site: 00039 RawElement::value
9 477 RawElement::value call site: 00477 RawElement::try_into
8 368 RawElement::value call site: 00368 read_lenencode
7 64 Document::len call site: 00064 ElementType::from
6 72 i32_from_slice call site: 00072
6 89 Timestamp::from_le_bytes call site: 00089 ParsedDecimal128::new
6 383 read_len call site: 00383
5 488 ParsedDecimal128::new call site: 00488

Runtime coverage analysis

Covered functions
1976
Functions that are reachable but not covered
3
Reachable functions
3
Percentage of reachable functions covered
0.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzz/fuzz_targets/raw_deserialize_utf8_lossy.rs 3
src/ser.rs 8
src/decimal128.rs 61
src/document.rs 10
src/raw/iter.rs 13
src/raw/array.rs 4
src/raw/bson_ref.rs 27
src/raw/array_buf.rs 2
src/oid.rs 2
src/raw/document.rs 17
src/serde_helpers.rs 2
src/error.rs 6
src/raw.rs 28
src/bson.rs 3
src/raw/serde/seeded_visitor.rs 6
src/uuid.rs 6
src/ser/serde.rs 19
src/ser/raw.rs 1
src/tests/serde.rs 7
src/tests/modules/lock.rs 2
src/datetime.rs 1
src/extjson/de.rs 20
src/spec.rs 2

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

fuzz/fuzz_targets/iterate.rs

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['Timestamp::from_le_bytes', 'RawElement::get_oid_at', 'usize_try_from_i32', 'i32_from_slice', 'RawElement::value']

fuzz/fuzz_targets/string_handling.rs

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['Timestamp::from_le_bytes', 'RawElement::get_oid_at', 'usize_try_from_i32', 'i32_from_slice', 'RawElement::value']

fuzz/fuzz_targets/type_markers.rs

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['Timestamp::from_le_bytes', 'RawElement::get_oid_at', 'usize_try_from_i32', 'i32_from_slice', 'RawElement::value']

fuzz/fuzz_targets/decode.rs

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['RawDocumentBuf::decode_from_bytes', 'Timestamp::from_le_bytes', 'usize_try_from_i32', 'RawDocumentBuf::new', 'RawArray::as_bytes', 'i32_from_slice', 'RawBsonRef::to_raw_bson']

fuzz/fuzz_targets/encoding.rs

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['Timestamp::from_le_bytes', 'Document::len', 'RawDocumentBuf::new', 'usize_try_from_i32', 'RawDocumentBuf::decode_from_bytes', 'i32_from_slice']

fuzz/fuzz_targets/raw_deserialize.rs

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['Timestamp::from_le_bytes', 'Serializer::new', 'SerializerHint::take', 'usize_try_from_i32', 'RawElement::get_oid_at', 'Document::len', 'i32_from_slice', 'read_len', 'ParsedDecimal128::new']

fuzz/fuzz_targets/raw_deserialize_utf8_lossy.rs

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['Timestamp::from_le_bytes', 'Serializer::new', 'SerializerHint::take', 'usize_try_from_i32', 'RawElement::get_oid_at', 'RawElement::value', 'Document::len', 'i32_from_slice']

Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
bson::de::serde::BsonVisitor as serde::de::Visitor::visit_map::bson::de::raw::RegexAccess 122 22 18.03%
bson::de::serde::BsonVisitor as serde::de::Visitor::visit_map::bson::de::raw::BinaryAccess 122 18 14.75%
bson::de::serde::BsonVisitor as serde::de::Visitor::visit_map::bson::de::raw::RawBsonAccess 122 41 33.60%
bson::de::serde::BsonVisitor as serde::de::Visitor::visit_map::bson::de::raw::DateTimeAccess 122 25 20.49%
bson::de::serde::BsonVisitor as serde::de::Visitor::visit_map::bson::de::raw::ObjectIdAccess 122 16 13.11%
bson::de::serde::BsonVisitor as serde::de::Visitor::visit_map::bson::de::raw::DbPointerAccess 122 23 18.85%
bson::de::serde::BsonVisitor as serde::de::Visitor::visit_map::bson::de::raw::TimestampAccess 122 23 18.85%
bson::de::serde::BsonVisitor as serde::de::Visitor::visit_map::bson::de::raw::CodeWithScopeAccess 122 24 19.67%
bson::de::serde::BsonVisitor as serde::de::Visitor::visit_map::bson::de::raw::Decimal128Access 122 30 24.59%
&mut bson::ser::raw::value_serializer::ValueSerializer as serde::ser::SerializeStruct::serialize_field::bson::oid::ObjectId 88 10 11.36%
&mut bson::ser::raw::value_serializer::ValueSerializer as serde::ser::SerializeStruct::serialize_field::bson::document::Document 88 10 11.36%
&mut bson::ser::raw::value_serializer::ValueSerializer as serde::ser::SerializeStruct::serialize_field::alloc::string::String 88 29 32.95%
&mut bson::ser::raw::value_serializer::ValueSerializer as serde::ser::SerializeStruct::serialize_field::serde_bytes::bytes::Bytes 88 11 12.5%
&mut bson::ser::raw::value_serializer::ValueSerializer as serde::ser::SerializeStruct::serialize_field::bson::extjson::models::BinaryBody 88 10 11.36%
&mut bson::ser::raw::value_serializer::ValueSerializer as serde::ser::SerializeStruct::serialize_field::bson::extjson::models::DateTimeBody 88 10 11.36%
&mut bson::ser::raw::value_serializer::ValueSerializer as serde::ser::SerializeStruct::serialize_field::bson::extjson::models::TimestampBody 88 10 11.36%
&mut bson::ser::raw::value_serializer::ValueSerializer as serde::ser::SerializeStruct::serialize_field::bson::extjson::models::TimestampBody as serde::ser::Serialize::serialize::__SerializeWith 88 10 11.36%
&mut bson::ser::raw::value_serializer::ValueSerializer as serde::ser::SerializeStruct::serialize_field::bson::raw::bson_ref::RawRegexRef as serde::ser::Serialize::serialize::BorrowedRegexBody 88 10 11.36%
&mut bson::ser::raw::value_serializer::ValueSerializer as serde::ser::SerializeStruct::serialize_field::bson::raw::bson_ref::RawDbPointerRef as serde::ser::Serialize::serialize::BorrowedDbPointerBody 88 10 11.36%
&mut bson::ser::raw::value_serializer::ValueSerializer as serde::ser::SerializeStruct::serialize_field::&bson::raw::cstr::CStr 88 12 13.63%
&mut bson::ser::raw::value_serializer::ValueSerializer as serde::ser::SerializeStruct::serialize_field::&str 88 9 10.22%
&mut bson::ser::raw::value_serializer::ValueSerializer as serde::ser::SerializeStruct::serialize_field::bool 88 10 11.36%
&mut bson::ser::raw::value_serializer::ValueSerializer as serde::ser::SerializeStruct::serialize_field::i32 88 13 14.77%
bson::de::raw::Deserializer as serde::de::Deserializer::deserialize_newtype_struct::bson::serde_helpers::Utf8LossyDeserialization_ as serde::de::Deserialize::deserialize::Vbson::document::Document 42 19 45.23%
bson::de::serde::BsonVisitor as serde::de::Visitor::visit_map::bson::de::serde::MapDeserializer 122 21 17.21%
bson::de::serde::Deserializer::deserialize_next::serde::de::impls::StringVisitor 39 11 28.20%
bson::de::serde::Deserializer::deserialize_next::serde::__private::de::content::ContentVisitor 39 11 28.20%
bson::de::serde::Deserializer::deserialize_next::bson::extjson::models::ObjectId as serde::de::Deserialize::deserialize::__FieldVisitor 39 11 28.20%
bson::de::serde::Deserializer::deserialize_next::bson::extjson::models::RegexBody as serde::de::Deserialize::deserialize::__FieldVisitor 39 11 28.20%
bson::de::serde::Deserializer::deserialize_next::bson::extjson::models::BinaryBody as serde::de::Deserialize::deserialize::__FieldVisitor 39 11 28.20%
bson::de::serde::Deserializer::deserialize_next::bson::extjson::models::TimestampBody as serde::de::Deserialize::deserialize::__FieldVisitor 39 11 28.20%
bson::de::serde::Deserializer::deserialize_next::bson::extjson::models::DbPointerBody as serde::de::Deserialize::deserialize::__FieldVisitor 39 11 28.20%

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
/src/bson-rust/src/bson.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/src/tests/modules/ser.rs [] []
/src/bson-rust/src/decimal128.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/src/de/raw.rs [] []
/src/bson-rust/fuzz/fuzz_targets/string_handling.rs ['string_handling'] []
/src/bson-rust/src/error/uuid.rs [] []
/src/bson-rust/src/binary.rs [] []
/src/bson-rust/serde-tests/test.rs [] []
/src/bson-rust/src/de/serde.rs [] []
/src/bson-rust/src/raw/array_buf.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/src/tests/modules/serializer_deserializer.rs [] []
/src/bson-rust/src/datetime/builder.rs [] []
/src/bson-rust/src/raw/bson_ref.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/src/error/decimal128.rs [] []
/src/bson-rust/src/error/value_access.rs [] []
/src/bson-rust/src/uuid.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/src/extjson/models.rs [] []
/src/bson-rust/src/tests/modules/lock.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/src/tests/binary_subtype.rs [] []
/src/bson-rust/src/macros.rs [] []
/src/bson-rust/fuzz/fuzz_targets/raw_deserialize_utf8_lossy.rs ['raw_deserialize_utf8_lossy'] []
/src/bson-rust/src/ser/raw/value_serializer.rs [] []
/src/bson-rust/src/raw/test/props.rs [] []
/src/bson-rust/src/raw/document.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/src/uuid/test.rs [] []
/src/bson-rust/src/raw/serde.rs [] []
/src/bson-rust/src/raw/serde/seeded_visitor.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/src/raw/bson.rs [] []
/src/bson-rust/fuzz/fuzz_targets/iterate.rs ['iterate'] []
/src/bson-rust/src/raw/document_buf/raw_writer.rs [] []
/src/bson-rust/src/de.rs ['decode'] []
/src/bson-rust/src/raw/serde/bson_visitor.rs [] []
/src/bson-rust/fuzz/fuzz_targets/raw_deserialize.rs ['raw_deserialize'] []
/src/bson-rust/src/tests/modules/document.rs [] []
/src/bson-rust/src/raw.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/src/error/oid.rs [] []
/src/bson-rust/src/document.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/wasm-test/src/test.rs [] []
/src/bson-rust/src/raw/iter.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/fuzz/fuzz_targets/encoding.rs ['encoding'] ['encoding']
/src/bson-rust/src/spec.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/src/ser/serde.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/src/oid.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/src/tests/serde_helpers.rs [] []
/src/bson-rust/fuzz/generate_corpus.rs [] []
/src/bson-rust/fuzz/fuzz_targets/type_markers.rs ['type_markers'] []
/src/bson-rust/src/tests/modules/oid.rs [] []
/src/bson-rust/src/binary/vector.rs [] []
/src/bson-rust/src/tests/spec/corpus.rs [] []
/src/bson-rust/src/tests/spec/vector.rs [] []
/src/bson-rust/src/raw/test.rs [] []
/src/bson-rust/src/tests/spec.rs [] []
/src/bson-rust/src/raw/test/append.rs [] []
/src/bson-rust/src/serde_helpers.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/src/raw/array.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/src/raw/document_buf.rs ['decode', 'encoding'] ['decode', 'encoding']
/src/bson-rust/src/tests/modules/macros.rs [] []
/src/bson-rust/serde-tests/json.rs [] []
/src/bson-rust/src/tests/datetime.rs [] []
/src/bson-rust/src/ser/raw/document_serializer.rs [] []
/src/bson-rust/src/tests/modules/binary.rs [] []
/src/bson-rust/src/ser.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] []
/src/bson-rust/fuzz/fuzz_targets/decode.rs ['decode'] []
/src/bson-rust/src/error.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/src/tests/serde.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/src/tests/modules/bson.rs [] []
/src/bson-rust/src/base64.rs [] []
/src/bson-rust/src/datetime.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/src/ser/raw.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']
/src/bson-rust/src/raw/cstr.rs ['decode'] ['decode']
/src/bson-rust/src/extjson/de.rs ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy'] ['iterate', 'string_handling', 'type_markers', 'decode', 'encoding', 'raw_deserialize', 'raw_deserialize_utf8_lossy']

Directories in report

Directory
/src/bson-rust/src/raw/document_buf/
/src/bson-rust/fuzz/fuzz_targets/
/src/bson-rust/src/
/src/bson-rust/src/tests/modules/
/src/bson-rust/src/tests/
/src/bson-rust/src/ser/raw/
/src/bson-rust/src/de/
/src/bson-rust/fuzz/
/src/bson-rust/src/uuid/
/src/bson-rust/src/raw/test/
/src/bson-rust/src/raw/serde/
/src/bson-rust/src/datetime/
/src/bson-rust/src/binary/
/src/bson-rust/src/ser/
/src/bson-rust/src/error/
/src/bson-rust/src/extjson/
/src/bson-rust/serde-tests/
/src/bson-rust/src/raw/
/src/bson-rust/wasm-test/src/
/src/bson-rust/src/tests/spec/